Author:
Herley Cormac,Florêncio Dinei
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Against Credential Thief - A Modular Honeytoken Based Framework;Mechanisms and Machine Science;2024
2. Zahira the Thief;2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS);2023-12-14
3. Malicious User Detection using Honeywords;2023 International Conference on Communication System, Computing and IT Applications (CSCITA);2023-03-31
4. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation;International Journal of Information Security;2023-02-17
5. Using Amnesia to Detect Credential Database Breaches;Advances in Information Security;2022-10-07